CN108334767A - A kind of mobile terminal administration method and mobile terminal - Google Patents

A kind of mobile terminal administration method and mobile terminal Download PDF

Info

Publication number
CN108334767A
CN108334767A CN201810220820.XA CN201810220820A CN108334767A CN 108334767 A CN108334767 A CN 108334767A CN 201810220820 A CN201810220820 A CN 201810220820A CN 108334767 A CN108334767 A CN 108334767A
Authority
CN
China
Prior art keywords
user
target user
information
attribute information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810220820.XA
Other languages
Chinese (zh)
Inventor
王随州
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Huarui Electronic Technology Co Ltd
Original Assignee
Dongguan Huarui Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Huarui Electronic Technology Co Ltd filed Critical Dongguan Huarui Electronic Technology Co Ltd
Priority to CN201810220820.XA priority Critical patent/CN108334767A/en
Publication of CN108334767A publication Critical patent/CN108334767A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a kind of mobile terminal administration method and mobile terminals, are used for technical field of mobile terminals.Present invention method includes:Start in target user and has added the first of application lock in application, showing application lock interface;Obtain the verification information of target user's input;If whether verification information is verified, the networked information of target user is obtained;The actual attribute information of target user is determined according to networked information, which is used to indicate the identity type of the target user;Judge whether actual attribute information is consistent with the target property information that target user has prestored;If consistent, it is determined that target user verifies successfully, the first application of unlock.When the present invention releases application lock other than using monomer information, networked information has also been used, the unlock safety using corresponding application lock has been improved, avoids user data and privacy leakage.

Description

A kind of mobile terminal administration method and mobile terminal
Technical field
The present invention relates to technical field of mobile terminals, more particularly to a kind of mobile terminal administration method and mobile terminal.
Background technology
With becoming increasingly popular for the terminals such as mobile phone, computer, user can install many applications in the terminal, in these applications Many applications can be related to privacy or property safety of user etc., and therefore, the privacy and safety applied in terminal also become people The topic of growing interest.
In the related technology, user usually by one or more of application lock locking terminal apply, come reach prevent by The effect that content in locking application is checked by other users.Application lock, which is one kind, can protect in terminal application content by easily The application checked.Specifically, it if user wants to avoid the content in some application in terminal to be checked easily, can incite somebody to action The application is added in application lock, i.e., locks the application by application lock.On this basis, when user needs into the application When related interfaces, terminal, which can be shown, waits for unlock interface, and user after unlock interface unlock by can just enter the arbitrary of the application Interface.
Currently, existing application lock unlock is typically limited to monomer information, such as verification information input by user (can be Username and password) etc., but monomer information is easy to be stolen by others, user not high so as to cause user's application lock safety There are still security risks for data.
Invention content
An embodiment of the present invention provides a kind of mobile terminal administration method and mobile terminals, to solve current application lock safety Property is not high, user data the problem of there are still security risks.
In a first aspect, the application provides a kind of mobile terminal administration method, this method includes:
Start in target user and has added the first of application lock in application, showing application lock interface;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information Show the identity type of the target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If one It causes, it is determined that the target user verifies successfully, unlock first application.
Further, before the networked information of the target user, the method further includes:
The camera for starting terminal built-in, is identified the face area of the target user, judges that the target is used Whether family blinks whithin a period of time, if so, determining that the target user is live body user.
Further, the camera for starting terminal built-in, is identified the face area of the target user, wraps It includes:
Start camera and carry out surrounding scanning, after scanning the face area for determining the target user, determines mobile terminal The location parameter of itself;
Shooting area is adjusted according to the location parameter, so that the shooting area can cover always the target The face area of user.
Further, described to include come the process for adjusting shooting area according to the location parameter:
When mobile terminal is overlooked or is looked up, pitch angle is obtained by the location parameter, the pitch angle is used for The angle that instruction terminal deviates downward or upward;
The adjustment angle of the camera is calculated using following formula according to the pitch angle;
According to the shooting angle for adjusting the angle the adjustment camera, so that shooting area can cover always mesh Mark the face area of user;
Or,
(Xworld, the Zworld) is the coordinate of the face area of the target user, described (Xcamera, Zcamera it is) coordinate of the shooting area, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is The angle of the shooting area, the m are the length of the camera, the dxFor the camera and the target user Face area vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
Further, the process of the networked information for obtaining the target user includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, it is the target user which, which points out information, Networked information.
Further, described that the process packet that information determines the actual attribute information of the target user is pointed out according to attribute It includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes The contact person of target user and the target user;
Relationship is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Iterate to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported Probability;
For the target user, using the highest candidate attribute information of third probability as the practical category of the target user Property information, the target user belong to each user.
Further, first probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint The quantity of the contact person of what value.
Further, following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
Further, the method further includes:
The instruction of the application addition application lock of target user couple second is obtained, second application is to be not added with answering for application lock With;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information Show the identity type of the target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If one It causes, it is determined that the target user verifies successfully, to the second application addition application lock.
Second aspect, the application also provide a kind of mobile terminal, including memory, processor and are stored in the memory Computer program that is upper and can running on the processor, wherein can be with when the processor execution computer program Realize any method in first aspect.
In the present invention, starts in target user and added the first of application lock in application, display application lock interface, is determining mesh When marking verification information input by user and being verified, the networked information of target user can be also obtained, and determine according to networked information The actual attribute information of target user, which is used to indicate the identity type of target user, only real when determining When border attribute information is consistent with the target property information that target user has prestored, it just can determine whether that target user verifies successfully, unlock First application improves so the present invention has also used networked information other than using monomer information using corresponding application lock Unlock safety, avoid user data and privacy leakage.
Description of the drawings
Fig. 1 is one embodiment schematic diagram of mobile terminal administration method in the embodiment of the present invention;
Fig. 2 is one embodiment schematic diagram of mobile terminal in the embodiment of the present invention.
Specific implementation mode
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The every other embodiment that member is obtained without making creative work should all belong to the model that the present invention protects It encloses.
The (if present)s such as term " first ", " second " in description and claims of this specification and above-mentioned attached drawing It is for distinguishing similar object, without being used to describe specific sequence or precedence.It should be appreciated that the number used in this way According to can be interchanged in the appropriate case, so as to the embodiments described herein can in addition to the content for illustrating or describing herein with Outer sequence is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover non-exclusive packet Contain, for example, containing what the process of series of steps or unit, method, system, product or equipment were not necessarily limited to clearly to list Those steps or unit, but may include not listing clearly or intrinsic for these processes, method, product or equipment Other steps or unit.
Referring to Fig. 1, one embodiment of mobile terminal administration method includes in the embodiment of the present invention:
S101, the first of application lock has been added in application, display application lock interface in target user's startup;
S102, the verification information for obtaining target user's input;
Wherein, the verification information of input can be numerical ciphers, gesture, the verification informations such as fingerprint.
If whether S103, the verification information are verified, the networked information of the target user is obtained;
S104, the actual attribute information that the target user is determined according to the networked information, the actual attribute information Identity type for indicating the target user;
S105, judge whether the actual attribute information is consistent with the target property information that the target user has prestored; If consistent, it is determined that the target user verifies successfully, unlock first application.
Wherein, first application is unlocked, that is, locking of the application lock to first application is released, so that user can be normal It first is applied using this.
In the present invention, starts in target user and added the first of application lock in application, display application lock interface, is determining mesh When marking verification information input by user and being verified, the networked information of target user can be also obtained, and determine according to networked information The actual attribute information of target user, which is used to indicate the identity type of target user, only real when determining When border attribute information is consistent with the target property information that target user has prestored, it just can determine whether that target user verifies successfully, unlock First application improves so the present invention has also used networked information other than using monomer information using corresponding application lock Unlock safety, avoid user data and privacy leakage.
Further, it in the embodiment of the present invention, before the networked information of the target user described in acquisition for mobile terminal, also needs Further to judge whether the target user is live body user, to prevent the case where computer makes repeated attempts.Therefore, in institute Before the networked information for stating target user, the method further includes:
The camera for starting terminal built-in, is identified the face area of the target user, judges that the target is used Whether family blinks whithin a period of time, if so, determining that the target user is live body user.
Further, since the parameters such as target user's face orientation may change, in order to ensure that camera can be aligned The face of target user needs to start camera progress surrounding scanning, after scanning the face area for determining target user, it is also necessary to Mobile terminal determines the location parameter of itself, then adjusts shooting area according to the location parameter, so that shooting area one Directly it is capable of the face area of coverage goal user.The i.e. described camera for starting terminal built-in, to the face of the target user Region is identified, including:
Start camera and carry out surrounding scanning, after scanning the face area for determining the target user, determines mobile terminal The location parameter of itself;
Shooting area is adjusted according to the location parameter, so that the shooting area can cover always the target The face area of user.
Further, described to include come the process for adjusting shooting area according to the location parameter:
When mobile terminal is overlooked or is looked up, pitch angle is obtained by the location parameter, the pitch angle is used for The angle that instruction terminal deviates downward or upward;
The adjustment angle of the camera is calculated using following formula according to the pitch angle;
According to the shooting angle for adjusting the angle the adjustment camera, so that shooting area can cover always mesh Mark the face area of user;
Or,
(Xworld, the Zworld) is the coordinate of the face area of the target user, described (Xcamera, Zcamera it is) coordinate of the shooting area, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is The angle of the shooting area, the m are the length of the camera, the dxFor the camera and the target user Face area vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
Further, the process of the networked information for obtaining the target user includes:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, it is the target user which, which points out information, Networked information.
Further, described that the process packet that information determines the actual attribute information of the target user is pointed out according to attribute It includes:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes The contact person of target user and the target user;
Relationship is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Iterate to calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third of each candidate attribute information of each user when iteration ends is exported Probability;
For the target user, using the highest candidate attribute information of third probability as the practical category of the target user Property information, the target user belong to each user.
Further, first probability is calculated as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i The quantity of people;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is to appoint The quantity of the contact person of what value.
Further, following formula is repeated, second probability is iterated to calculate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j When, the βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, institute State βkSecond value, first numerical value is taken to be more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
Further, the method further includes:
The instruction of the application addition application lock of target user couple second is obtained, second application is to be not added with answering for application lock With;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
Determine that the actual attribute information of the target user, the actual attribute information are used for table according to the networked information Show the identity type of the target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If one It causes, it is determined that the target user verifies successfully, to the second application addition application lock.
As shown in Fig. 2, the present invention also provides a kind of mobile terminal, which includes memory 201, processor 202 And it is stored in the computer program 203 that can be run on the memory and on the processor, wherein the processor 202 The mobile terminal described in any embodiment in above-mentioned mobile terminal administration method may be implemented when executing the computer program 203 Management method.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be the indirect coupling by some interfaces, device or unit It closes or communicates to connect, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can be stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the present invention Portion or part steps.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Stating embodiment, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or equivalent replacement of some of the technical features;And these Modification or replacement, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of mobile terminal administration method, which is characterized in that it is applied to mobile terminal, the method includes:
Start in target user and has added the first of application lock in application, showing application lock interface;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
The actual attribute information of the target user is determined according to the networked information, the actual attribute information is for indicating institute State the identity type of target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent, Determine that the target user verifies successfully, unlock first application.
2. according to the method described in claim 1, it is characterized in that, before the networked information of the target user, the side Method further includes:
The camera for starting terminal built-in, is identified the face area of the target user, judges that the target user is It is no to blink whithin a period of time, if so, determining that the target user is live body user.
3. according to the method described in claim 2, it is characterized in that, it is described start terminal built-in camera, to the target The face area of user is identified, including:
Start camera and carry out surrounding scanning, after scanning the face area for determining the target user, determines mobile terminal itself Location parameter;
Shooting area is adjusted according to the location parameter, so that the shooting area can cover always the target user Face area.
4. according to the method described in claim 3, it is characterized in that, described adjust shooting area according to the location parameter Process includes:
When mobile terminal is overlooked or is looked up, pitch angle is obtained by the location parameter, the pitch angle is used to indicate The angle that terminal deviates downward or upward;
The adjustment angle of the camera is calculated using following formula according to the pitch angle;
According to the shooting angle for adjusting the angle the adjustment camera, so that shooting area always being capable of coverage goal use The face area at family;
Or,
(Xworld, the Zworld) is the coordinate of the face area of the target user, and (Xcamera, the Zcamera) is The coordinate of the shooting area, it is describedFor the pitch angle, the φ is the adjustment angle, and the θ is the shooting area Angle, the m be the camera length, the dxFor the camera and the face area of the target user Vertical range, the dzFor the horizontal distance of the camera and the face area of the target user.
5. according to the method described in claim 1, it is characterized in that, the process of the networked information for obtaining the target user Including:
Read the contact person in the high in the clouds address list of the target user;
It obtains contact person and information is pointed out to the attribute of the target user, which points out the connection that information is the target user Net information.
6. according to the method described in claim 5, it is characterized in that, described point out information according to attribute and determine the target user The process of actual attribute information include:
The first probability of each candidate attribute information of each user of information initializing is pointed out according to the attribute, each user includes target The contact person of user and the target user;
Relationship iteration is pointed out according to the attribute between the first probability and each user of each candidate attribute information of each user Calculate the second probability of each candidate attribute information of each user;
When meeting preset stopping criterion for iteration, the third for exporting each candidate attribute information of each user when iteration ends is general Rate;
For the target user, believe the highest candidate attribute information of third probability as the actual attribute of the target user Breath, the target user belong to each user.
7. according to the method described in claim 6, it is characterized in that, calculating first probability as follows:
The Wi,jFor the first probability of the candidate attribute information j of user i;
The contact person that the candidate attribute information of the user i is j is pointed out in the contact person that the count (j) is the user i Quantity;
It is describedThe candidate attribute information that the user i is pointed out in contact person for the user i is any value Contact person quantity.
8. according to the method described in claim 6, it is characterized in that, repeating following formula, iterative calculation described second is general Rate:
Wi,j=Vi,j
The Vi,jFor the second probability of the candidate attribute information j of the user i;
The α is iterative rate control parameter, and the α is constant, and the α is used to adjust the speed of iterative calculation;
The βkFor weight coefficient, when the attribute information that user k points out user i is j, and the attribute information of user k is also j, institute State βkThe first numerical value is taken, when the attribute information that user k points out user i is j, and the attribute information of user k is not j, the βkIt takes Second value, first numerical value are more than the second value;
The m is the total quantity of all types attribute information;
The n be the user i contact person in the user i have attribute point out relationship contact person quantity.
9. according to the method described in claim 1, it is characterized in that, the method further includes:
The instruction of the application addition application lock of target user couple second is obtained, second application is to be not added with the application of application lock;
Obtain the verification information of target user's input;
If whether the verification information is verified, the networked information of the target user is obtained;
The actual attribute information of the target user is determined according to the networked information, the actual attribute information is for indicating institute State the identity type of target user;
Judge whether the actual attribute information is consistent with the target property information that the target user has prestored;If consistent, Determine that the target user verifies successfully, to the second application addition application lock.
10. a kind of mobile terminal, which is characterized in that including memory, processor and be stored on the memory and can be in institute State the computer program run on processor, wherein the processor may be implemented right when executing the computer program and want Seek any method in 1 to 9.
CN201810220820.XA 2018-03-16 2018-03-16 A kind of mobile terminal administration method and mobile terminal Pending CN108334767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810220820.XA CN108334767A (en) 2018-03-16 2018-03-16 A kind of mobile terminal administration method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810220820.XA CN108334767A (en) 2018-03-16 2018-03-16 A kind of mobile terminal administration method and mobile terminal

Publications (1)

Publication Number Publication Date
CN108334767A true CN108334767A (en) 2018-07-27

Family

ID=62930936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810220820.XA Pending CN108334767A (en) 2018-03-16 2018-03-16 A kind of mobile terminal administration method and mobile terminal

Country Status (1)

Country Link
CN (1) CN108334767A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216887A (en) * 2008-01-04 2008-07-09 浙江大学 An automatic computer authentication method for photographic faces and living faces
CN105847127A (en) * 2016-05-04 2016-08-10 腾讯科技(深圳)有限公司 User attribute information determination method and server
CN105933215A (en) * 2016-07-09 2016-09-07 东莞市华睿电子科技有限公司 Chat message withdraw control method based on instant messaging

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216887A (en) * 2008-01-04 2008-07-09 浙江大学 An automatic computer authentication method for photographic faces and living faces
CN105847127A (en) * 2016-05-04 2016-08-10 腾讯科技(深圳)有限公司 User attribute information determination method and server
CN105933215A (en) * 2016-07-09 2016-09-07 东莞市华睿电子科技有限公司 Chat message withdraw control method based on instant messaging

Similar Documents

Publication Publication Date Title
US20200293645A1 (en) Hardening Security Images
Thorpe et al. Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords.
US20090076965A1 (en) Counteracting random guess attacks against human interactive proofs with token buckets
US9747434B1 (en) Authenticating with an external device by providing a message having message fields arranged in a particular message field order
CN110414271A (en) A kind of private data guard method, device and computer readable storage medium
CN105868970A (en) Authentication method and electronic device
CN107491674A (en) Feature based information carries out the method and device of user's checking
WO2014151890A1 (en) Securely transferring authentication information
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
CN109639724A (en) Password method for retrieving, password device for retrieving, computer equipment and storage medium
CN111241566A (en) Policy management method, electronic device, computer device, and storage medium
KR101808215B1 (en) User authentication method, authentication apparatus, and terminal
US6134657A (en) Method and system for access validation in a computer system
CN108334767A (en) A kind of mobile terminal administration method and mobile terminal
CN107391987A (en) Application guard method, device and electronic equipment based on living things feature recognition
CN108205630A (en) Resource access method and device based on SeLinux under a kind of multi-user
CN109086624A (en) login method and device
CN108230211A (en) A kind of resident information authentication method based on property information
JPH11328118A (en) User authenticating method and storage medium
CN104615553B (en) Data capture method, data acquisition facility and terminal
CN110363007B (en) Method and device for updating trusted policy
CN110087235B (en) Identity authentication method and device, and identity authentication method and device adjustment method and device
CN106535300A (en) Network access method and device
CN108449337A (en) A kind of password method for retrieving
TWM601847U (en) System for authentication with device binding

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180727

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1263404

Country of ref document: HK